*** Official Ubiquiti Discussion Thread ***

A few quick stats on power use.

UNAS-2 - No Drives ~7W from the PoE stats
UNAS-2 - 2 x Seagate EXOS M 28TB - ~19W - Idle
UNAS-2 - 2 x Seagate EXOS M 28TB ~27W - Under Load

UNAS-Pro-8 - No Drives ~28W
UNAS-Pro-8 - 2 X M.2 WD SN7100 ~30W
UNAS-Pro-8 - 6X WD Gold 16TB / 2 X M.2 WD SN7100 - TBC - Idle
UNAS-Pro-8 - 6X WD Gold 16TB / 2 X M.2 WD SN7100 - TBC - Under Load

I'll update with drives over the course of the weekend, along with the normal UNAS-Pro.
 
Last edited:
:p:p:p:p - this is too funny.

So the cable (Amazon bought) that worked fine at 10Gb with the SFP module......worked fine and then kept switching to FE speeds. I've terminated a new one from my spool, all good but will keep an eye on it.
 
Oh balls, why is buying Unifi equipment so addictive?
Best to just not look very often. I kind of want to update to WiFi7 and 6ghz for no reason. But I want a Mesh style one, the Wall on a table mount is tempting though but unsure if that's the same 360deg coverage like the mesh is.
 
I'm looking at getting the toolless mini rack, Is this worth getting or is there better options about?

Thanks
 
Last edited:
I'm looking at getting the toolless mini rack, Is this worth getting or is there better options about?

Thanks
Depends on so many things, what you want to put in it, I go by the rule of what ever you think you'll need them double it. Even then I've ran out of space. Unifi are releasing fairly deep stuff now as well like the NAS if that interests you.
I like enclosed racks as well.
 
Depends on so many things, what you want to put in it, I go by the rule of what ever you think you'll need them double it. Even then I've ran out of space. Unifi are releasing fairly deep stuff now as well like the NAS if that interests you.
I like enclosed racks as well.
I have the at the moment UDM Pro and 16 port POE switch (Unifi)

Looking at adding one of there UPS's and a patch panel, nothing too much.

At the moment the ethernet leads go straight in to the switch and I am using the Ikea table!
 
I'm still thinking of a UNAS 2bay purely as a backup to the main NAS. I only actually have about 2TB of irreplaceable data, the rest I could actually get hold of again.
 
So ive just started down the rabit hole with a gateway max (512gb) and u7 pro as they were on offer, just bought a poe injector for the moment but i think this is a start of a deeper issue, already looking at propper poe switches, cameras and doorbells :D
 
A question for those who probably know more than me... I've got a couple of external ethernet connections (one to my car charger & 1 to an external WAP).
What's best practice to secure these connections?
I've implemented MAC filtering on the charger connection, so only that can connect, but I can't do that with the WAP, otherwise nothing can connect through the WAP. I don't really want to put the WAP on a seperate VLAN that can only get to the web, as occasionally I want to be able to access stuff on my home network when I connect to this WAP. Is there a good way to add some security on here? (tbh the likelyhood of someone plugging into that ethernet cable to access my network is practically 0, but I'd rather secure it if possible)
 
A question for those who probably know more than me... I've got a couple of external ethernet connections (one to my car charger & 1 to an external WAP).
What's best practice to secure these connections?
I've implemented MAC filtering on the charger connection, so only that can connect, but I can't do that with the WAP, otherwise nothing can connect through the WAP. I don't really want to put the WAP on a seperate VLAN that can only get to the web, as occasionally I want to be able to access stuff on my home network when I connect to this WAP. Is there a good way to add some security on here? (tbh the likelyhood of someone plugging into that ethernet cable to access my network is practically 0, but I'd rather secure it if possible)
I forget the terminology but you can still use VLANs but the password you use the connect to the WiFi dictates which VLAN the device uses.
I just have my trusted services correct to the main vlan and iot stuff to a different vlan just set them up as different ssids.
You could turn off DHCP as well and restrict the IP range.
 
Last edited:
What's best practice to secure these connections?
Possibly 802.1x although i would double check Ubiquiti's implementation; last i heard it was WAP/WiFi only and a bit half-baked.

I forget the terminology...
I think @R.C.Anderson meant the physical connection preventing cretins disconnecting a device and hoping on to the network.
 
Last edited:
I would probably just ignore it as a possibility, you could stick the AP on a management VLAN and the client traffic on a different one and hope that nobody can figure the tag out, but nobody is turning up at 3am to take your AP down in order to access your home network outside of well resourced threat actors and if they're targeting you then you've already lost.
 
I forget the terminology but you can still use VLANs but the password you use the connect to the WiFi dictates which VLAN the device uses.
I just have my trusted services correct to the main vlan and iot stuff to a different vlan just set them up as different ssids.
You could turn off DHCP as well and restrict the IP range.
Yea, I already use different VLANs for different SSIDs for the purpose of iot stuff etc, this is more physical connections to this port, as the cable is in an unsecured location.
 
Possibly 802.1x although i would double check Ubiquiti's implementation; last i heard it was WAP/WiFi only and a bit half-baked.


I think @R.C.Anderson meant the physical connection preventing cretins disconnecting a device and hoping on to the network.
I'll have a look into 802.1x with ubiquiti, see what I can find & if it suits my needs.

Yes, this is more how would i stop someone having access if they (for example), unplugged the wap & plugged their laptop in there instead.
 
I would probably just ignore it as a possibility, you could stick the AP on a management VLAN and the client traffic on a different one and hope that nobody can figure the tag out, but nobody is turning up at 3am to take your AP down in order to access your home network outside of well resourced threat actors and if they're targeting you then you've already lost.
That's pretty much the point I'm at. The likelehood is practically 0, and if someone was so desprate to get into my network, I've probably got bigger problems. I'm still curious from a education perspective though.
 
The answer is port security and 802.1x with certificates stored in the device, which a car charger won't support and I don't think UniFi APs do either.
 
Back
Top Bottom